CVE-2024-55271
Plain English Summary
AI-powered analysis for quick understanding
An attacker can trick a logged-in user of the gym management system into unknowingly updating their profile information by sending them a malicious link. This vulnerability requires the user to be logged in and click on the link while visiting the attacker's site, potentially allowing the attacker to change the user's details without their consent.
Technical Description
A Cross-Site Request Forgery (CSRF) vulnerability has been identified in phpgurukul Gym Management System 1.0. This issue is present in the profile update functionality of the User Panel, specifically the /profile.php endpoint.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 17, 2026
about 2 months ago
Last Modified
Feb 23, 2026
about 1 month ago
Vendor
phpgurukul
Product
gym management system
Related Vulnerabilities
This vulnerability allows an attacker to inject malicious scripts into the student record system, potentially compromising users' data or sessions when they visit the affected page. The attack can be executed remotely by manipulating a specific argument in the URL, making it easy for attackers to exploit.
An attacker can inject malicious scripts into the PHPGurukul Student Record Management System through the Course Short Name field, potentially allowing them to steal sensitive information from users who visit the compromised page. This vulnerability can be exploited remotely, meaning the attacker doesn't need physical access to the system to carry out the attack.
This vulnerability allows an attacker to manipulate the database of the student management system by injecting harmful SQL code through the searchdata parameter, potentially exposing sensitive information or altering data. To exploit this, the attacker needs access to the search feature on the admin page.